# https://syzkaller.appspot.com/bug?id=3c27eae7bdba97293b68e79c9700ac110f977eed # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:false Repeat:false Procs:1 Sandbox: Fault:false FaultCall:-1 FaultNth:0 EnableTun:false UseTmpDir:false EnableCgroups:false HandleSegv:false WaitRepeat:false Debug:false Repro:false} r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0xd8, @mcast1={0xff, 0x1, [], 0x1}, 0x1f}}, 0x7, 0xeb8}, &(0x7f0000000000)=0x90) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x60401, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={r1, 0x7}, &(0x7f0000000180)=0x8) r3 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@nfc, &(0x7f0000000380)=0x80, 0x0) accept4$nfc_llcp(r3, 0x0, &(0x7f0000000080), 0x0) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$TCFLSH(r4, 0x540b, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000200)=0x2, 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x8010, 0xffffffffffffffff, 0x0) keyctl$assume_authority(0x10, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r6, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r5, {0x2, 0x0, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) close(r5) close(r6)